Bitcoinist
2025-08-10 12:30:14

Crypto Thieves Dubbed ‘GreedyBear’ Run Industrial-Scale Scam – Details

A cybercrime group called “ GreedyBear ” has been accused of stealing over $1 million through what researchers say is one of the most wide-reaching crypto theft operations seen in months. Reports from Koi Security reveal the group is running a coordinated campaign that mixes malicious browser extensions, malware, and scam websites — all under one network. Extensions Turned Into Wallet-Stealing Tools Instead of focusing on just one method, GreedyBear has combined several. According to Koi Security researcher Tuval Admoni, the group has deployed more than 650 malicious tools in its latest push. This marks a sharp rise from its earlier “Foxy Wallet” operation in July, which involved 40 Firefox extensions. The group’s tactic, called “Extension Hollowing,” starts with publishing clean-looking Firefox add-ons such as video downloaders or link cleaners. These extensions, released under fresh publisher accounts, collect fake positive reviews to appear trustworthy. Later, they are swapped for malicious versions impersonating wallets like MetaMask, TronLink, Exodus, and Rabby Wallet. Once installed, they grab credentials from input fields and send them to GreedyBear’s control servers. Malware Hidden In Pirated Software Investigators have also tied nearly 500 malicious Windows files to the same group. Many of these belong to well-known malware families such as LummaStealer, ransomware similar to Luca Stealer, and trojans acting as loaders for other harmful programs. Distribution frequently occurs through Russian-language websites that host cracked or “repacked” software. Targeting those seeking free software, the attackers reach far beyond the crypto community. Modular malware was also found by Koi Security, in which operators can add or swap functions without deploying completely new files. Fake Crypto Services Created To Swipe Data Based on reports , in addition to the browser attacks and malware, GreedyBear has established fraudulent websites that fake themselves as genuine cryptocurrency solutions. Some of these are said to offer hardware wallets, and others are fake wallet repair services for devices such as Trezor. Also on offer are fake wallet apps with good-looking designs that trick users into inputting recovery phrases, private keys, and payment information. Unlike standard phishing sites that copy exchange login pages, these scam pages look more like product or support portals. Reports added that some of them remain active and are still collecting sensitive data, while others are on standby for future use. Investigators found that nearly all domains tied to these operations lead back to a single IP address — 185.208.156.66. This server acts as the campaign’s hub, handling stolen credentials, coordinating ransomware activity, and hosting scam sites. Featured image from Unsplash, chart from TradingView

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.